{"id":287,"date":"2025-04-28T03:22:23","date_gmt":"2025-04-28T03:22:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dgray25\/?p=287"},"modified":"2025-04-28T03:34:20","modified_gmt":"2025-04-28T03:34:20","slug":"write-up-exploring-attacks-on-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/dgray25\/2025\/04\/28\/write-up-exploring-attacks-on-availability\/","title":{"rendered":"Exploring Attacks on Availability"},"content":{"rendered":"\n<p>According to the Cybersecurity and Infrastructure Security Agency, \u201ca denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor\u201d (CISA). It is often carried out by flooding a network server with traffic until it becomes unresponsive or crashes. This renders services such as emails and websites inaccessible to legitimate users (CISA). A Distributed Denial of Service Attack (DDoS) is identical to a DoS attack, just on a larger scale. It utilizes several machines to flood a targeted resource, rendering the attack more harmful and harder to track down. DDoS, as well as DoS attacks, are the most common attacks on availability, which is a type of cyberattack that impedes a user\u2019s ability to access their information.&nbsp;<\/p>\n\n\n\n<p>DDoS attacks can lead to significant consequences for businesses, such as a loss of revenue due to loss of sales and costs of recovery. Frequent DDoS attacks can cause reputational damage as they can affect customers&#8217; trust in the company (Canadian Centre for CyberSecurity). Different types of DDoS attacks target different parts of a system. The overall impact depends on what is targeted and the duration of the attack (National Cyber Security Centre). The largest DDoS attack that happened recently occurred in October 2024. The attack primarily targeted an internet service provider in Eastern Asia. Web infrastructure and security company, Cloudflare, reported the attack reached 5.6 terabits per second and 666 million packets per second at its peak. The attack lasted about 80 seconds (Yoachimik and Pacheco).&nbsp;<\/p>\n\n\n\n<p>Canadian Centre for CyberSecurity. \u201cDefending against Distributed Denial of Service (DDoS) Attacks \u2013 ITSM.80.110.\u201d <em>Canadian Centre for Cyber Security<\/em>, 9 Jan. 2024, <a href=\"http:\/\/www.cyber.gc.ca\/en\/guidance\/defending-against-distributed-denial-service-ddos-attacks-itsm80110\">www.cyber.gc.ca\/en\/guidance\/defending-against-distributed-denial-service-ddos-attacks-itsm80110<\/a>.&nbsp; Accessed 6 Apr. 2025.&nbsp;<\/p>\n\n\n\n<p>CISA. \u201cUnderstanding Denial-of-Service Attacks.\u201d <em>Cybersecurity and Infrastructure Security Agency<\/em>, CISA, 1 Feb. 2021, <a href=\"http:\/\/www.cisa.gov\/news-events\/news\/understanding-denial-service-attacks\">www.cisa.gov\/news-events\/news\/understanding-denial-service-attacks<\/a>.&nbsp; Accessed 5 Apr. 2025.<\/p>\n\n\n\n<p>National Cyber Security Centre. \u201cDenial of Service (DoS) Guidance.\u201d <em>National Cyber Security Centre<\/em>, 25 Mar. 2024, <a href=\"http:\/\/www.ncsc.gov.uk\/collection\/denial-service-dos-guidance-collection\">www.ncsc.gov.uk\/collection\/denial-service-dos-guidance-collection<\/a>.&nbsp; Accessed 6 Apr. 2025.<\/p>\n\n\n\n<p>Yoachimik, Omer, and Jorge Pacheco. \u201cRecord-Breaking 5.6 Tbps DDoS Attack and Global DDoS Trends for 2024 Q4.\u201d <em>The Cloudflare Blog<\/em>, 21 Jan. 2025, <a href=\"http:\/\/blog.cloudflare.com\/ddos-threat-report-for-2024-q4\/\">blog.cloudflare.com\/ddos-threat-report-for-2024-q4\/<\/a>.&nbsp; Accessed 6 Apr. 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the Cybersecurity and Infrastructure Security Agency, \u201ca denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor\u201d (CISA). It is often carried out by flooding a network server with traffic until it becomes unresponsive or&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dgray25\/2025\/04\/28\/write-up-exploring-attacks-on-availability\/\">Read More<\/a><\/div>\n","protected":false},"author":30577,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/posts\/287"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/users\/30577"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/posts\/287\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dgray25\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}